Arad, Israel

Naor Kalbo


 

Average Co-Inventor Count = 4.0

ph-index = 1


Company Filing History:


Years Active: 2022

Loading Chart...
Loading Chart...
1 patent (USPTO):Explore Patents

Title: Naor Kalbo: Innovator in Echo Detection Technology

Introduction

Naor Kalbo is a notable inventor based in Arad, Israel. He has made significant contributions to the field of technology, particularly in the area of network security. His innovative approach to detecting anomalies in communication systems has garnered attention in the tech community.

Latest Patents

Naor Kalbo holds a patent for "Echo detection of Man-in-the-Middle LAN attacks." This patent outlines systems and methods for detecting anomalous messages on a multipoint serial communications bus. The process involves extracting features from both the first and second messages, including time delays, sender and recipient addresses, bus numbers, and word counts. By generating a message transition pattern from these features, the probability of occurrence is determined by comparing it to a pattern dictionary. A message is deemed anomalous if its probability falls below a predetermined threshold.

Career Highlights

Throughout his career, Naor Kalbo has worked with various organizations, including B.G. Negev Technologies and Applications Ltd. and Ben-Gurion University of the Negev Research and Development Authority. His work has focused on enhancing the security of communication systems, making significant strides in the detection of potential threats.

Collaborations

Naor has collaborated with notable individuals in his field, including Asaf Shabtai and Yisroel Avraham Mirsky. These collaborations have contributed to the advancement of his research and the development of innovative solutions in network security.

Conclusion

Naor Kalbo's contributions to the field of technology, particularly in echo detection and network security, highlight his role as an influential inventor. His patent and collaborative efforts reflect a commitment to enhancing communication systems and protecting them from potential threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…